2015 5th International Conference on IT Convergence and Security (ICITCS) 2015
DOI: 10.1109/icitcs.2015.7293037
|View full text |Cite
|
Sign up to set email alerts
|

Wireless Intruder Detection System (WIDS) in Detecting De-Authentication and Disassociation Attacks in IEEE 802.11

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(11 citation statements)
references
References 4 publications
0
11
0
Order By: Relevance
“…Our method focuses on a single client and it uses combinations of three parameters do decrease the false positive rate. Authors [15] used a combination of the radio-tap header information for the detection of de-authentication attacks such as channel type, dB Antenna signal, and rate. Authors [16] used only reason code parameter in the MAC header to detect the attack.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Our method focuses on a single client and it uses combinations of three parameters do decrease the false positive rate. Authors [15] used a combination of the radio-tap header information for the detection of de-authentication attacks such as channel type, dB Antenna signal, and rate. Authors [16] used only reason code parameter in the MAC header to detect the attack.…”
Section: Resultsmentioning
confidence: 99%
“…But the main drawback of this is that they considered a number of different types of packets transferred on the network. Authors in [15] proposed a new technique for preventing a de-authentication attack. This tool can be used as personal WIDS.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Some of the studies offered solution to avoid the adversary before they launch an attack. Baharudin et al [42] proposed a personal IDS which is able to notify users, when RAP is attempting to impersonate. Selvarathinam et al [43] enhanced the current IDS, with discrete event system (DES) as antifailure of RAP detection, while Kumar and Paul [44] were prone to leveraging the previous AP information value, as the identifier in determining the RAP surrounding the area.…”
Section: Ap Profilingmentioning
confidence: 99%
“…If there is a time constraint, the attacker must attempt forced deauthentication [8]. This raises the issue that forced de-authentication may be detected through a network scanner such as Wireshark or through more complex IDS [4]. In this attack, we facilitate such a threat through the removal of time constraints.…”
Section: Attacksmentioning
confidence: 99%
“…We demonstrate the threat of HDMI-Walk with a specific testbed of commonly used HDMI equipment (e.g., Google Chromecast and Sharp Smart TV) for the evaluation of HDMI-Walk attacks. Specifically, as proof-ofconcepts, we performed five novel HDMI-Walk attacks involving: (1) malicious topology inference; (2) Denial-of-Service attacks; (3) audio eavesdropping with sensitive data transfer over HDMI; (4) targeted device attacks to disrupt services through HDMI; and (5) finally the facilitation of existing wireless-based attacks with a CEC-enabled HDMI device. We also evaluated the implications of these attacks as part of this work.…”
Section: Introductionmentioning
confidence: 99%